Batch RSA

被引:0
|
作者
Amos Fiat
机构
[1] Tel-Aviv University,Department of Computer Science
来源
Journal of Cryptology | 1997年 / 10卷
关键词
RSA; Amortization; Computational complexity; Assymetric cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
We present a variant of the RSA algorithm called Batch RSA with two important properties:• The cost per private operation is exponentially smaller than other number-theoretic schemes [9], [23], [22], [11], [13], [12]. In practice, the new variant effectively performs several modular exponentiations at the cost of a single modular exponentiation. This leads to a very fast RSA-like scheme whenever RSA is to be performed at some central site or when pure-RSA encryption (versus hybrid encryption) is to be performed.• An additional important feature of Batch RSA is the possibility of using a distributed Batch RSA process that isolates the private key from the system, irrespective of the size of the system, the number of sites, or the number of private operations that need to be performed.
引用
收藏
页码:75 / 88
页数:13
相关论文
共 50 条
  • [1] Batch RSA
    Fiat, A
    JOURNAL OF CRYPTOLOGY, 1997, 10 (02) : 75 - 88
  • [2] Secure batch verification protocol for RSA signature scheme
    Jia, ZP
    Li, QC
    Li, ZC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (01): : 54 - 57
  • [3] Batch Private Keys Generation for RSA in Security Communication Systems
    陈运
    陈新
    Journal of Electronic Science and Technology of China, 2005, (01) : 22 - 26
  • [4] Cryptanalysis and improvement on batch verifying multiple RSA digital signatures
    Bao, F
    Lee, CC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2006, 172 (02) : 1195 - 1200
  • [5] Efficient identification of bad signatures in RSA-type batch signature
    Lee, S
    Cho, SJ
    Choi, J
    Cho, YK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 74 - 80
  • [6] A-RSA: Augmented RSA
    Karakra, Abdallah
    Alsadeh, Ahmad
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1016 - 1023
  • [7] Simple Backdoors on RSA Modulus by Using RSA Vulnerability
    Sun, Hung-Min
    Wu, Mu-En
    Yang, Cheng-Ta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (09): : 2326 - 2332
  • [8] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    Journal of Cryptology, 2004, 17 : 81 - 104
  • [9] RSA-OAEP is secure under the RSA assumption
    Fujisaki, E
    Okamoto, T
    Pointcheval, D
    Stern, J
    JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 81 - 104
  • [10] Certifying RSA
    Kakvi, Saqib A.
    Kiltz, Eike
    May, Alexander
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 404 - 414